{"id":798700,"date":"2021-07-03T10:25:08","date_gmt":"2021-07-03T10:25:08","guid":{"rendered":"https:\/\/telecomlive.in\/web\/2021\/07\/03\/new-ransomware-attack-paralyzes-hundreds-of-u-s-companies\/"},"modified":"2021-07-03T10:25:08","modified_gmt":"2021-07-03T10:25:08","slug":"new-ransomware-attack-paralyzes-hundreds-of-u-s-companies","status":"publish","type":"post","link":"https:\/\/telecomlive.in\/web\/2021\/07\/03\/new-ransomware-attack-paralyzes-hundreds-of-u-s-companies\/","title":{"rendered":"New ransomware attack paralyzes hundreds of U.S. companies"},"content":{"rendered":"<p>A ransomware attack paralyzed the networks of at least 200 U.S. companies on Friday, according to a cybersecurity researcher whose company was responding to the incident.<\/p>\n<p>The REvil gang, a major Russian-speaking ransomware syndicate, appears to be behind the attack, said John Hammond of the security firm Huntress Labs. He said the criminals targeted a software supplier called Kaseya, using its network management package as a conduit to spread the ransomware through cloud service providers. Other researchers agreed with Hammond&#8217;s assessment.<\/p>\n<p>&#8220;Kaseya handles large enterprise all the way to small businesses globally, so ultimately, (this) has the potential to spread to any size or scale business,&#8221; Hammond said in a direct message on Twitter. &#8220;This is a colossal and devastating supply chain attack.&#8221; Such cyberattacks typically infiltrate widely used software and spread malware as it automatically updates.<\/p>\n<p>It was not immediately clear how many Kaseya customers might be affected or who they might be. Kaseya urged customers in a statement on its website to immediately shut down servers running the affected software. It said the attack was limited to a &#8220;small number&#8221; of its customers.<\/p>\n<p>Brett Callow, a ransomware expert at the cybersecurity firm Emsisoft, said he was unaware of any previous ransomware supply-chain attack on this scale. There have been others, but they were fairly minor, he said.<\/p>\n<p>&#8220;This is SolarWinds with ransomware,&#8221; he said. He was referring to a Russian cyberespionage hacking campaign discovered in December that spread by infecting network management software to infiltrate U.S. federal agencies and scores of corporations.<\/p>\n<p>Cybersecurity researcher Jake Williams, president of Rendition Infosec, said he was already working with six companies hit by the ransomware. It&#8217;s no accident that this happened before the Fourth of July weekend, when IT staffing is generally thin, he added.<\/p>\n<p>&#8220;There&#8217;s zero doubt in my mind that the timing here was intentional,&#8221; he said.<\/p>\n<p>Hammond of Huntress said he was aware of four managed-services providers &#8211; companies that host IT infrastructure for multiple customers &#8211; being hit by the ransomware, which encrypts networks until the victims pay off attackers. He said thousand of computers were hit.<\/p>\n<p>&#8220;We currently have three Huntress partners who are impacted with roughly 200 businesses that have been encrypted,&#8221; Hammond said.<\/p>\n<p>Hammond wrote on Twitter: &#8220;Based on everything we are seeing right now, we strongly believe this (is) REvil\/Sodinikibi.&#8221; The FBI linked the same ransomware provider to a May attack on JBS SA, a major global meat processer.<\/p>\n<p>The White House and the federal Cybersecurity and Infrastructure Security Agency did not immediately return messages seeking comment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A ransomware attack paralyzed the networks of at least 200 U.S. companies on Friday, according to a cybersecurity researcher whose company was responding to the incident. The REvil gang, a major Russian-speaking ransomware syndicate, appears to be behind the attack, said John Hammond of the security firm Huntress Labs. He said the criminals targeted a software supplier called Kaseya, using its network management package as a conduit to spread the ransomware through cloud service providers. Other researchers agreed with Hammond&#8217;s assessment. &#8220;Kaseya handles large enterprise all the way to small businesses globally, so ultimately, (this) has the potential to spread [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-798700","post","type-post","status-publish","format-standard","hentry","category-it-2"],"acf":[],"_links":{"self":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/798700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/comments?post=798700"}],"version-history":[{"count":0,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/798700\/revisions"}],"wp:attachment":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/media?parent=798700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/categories?post=798700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/tags?post=798700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}